Docker Desktop Security Update Advisory (CVE-2024-8695, CVE-2024-8696)

Overview An update has been released to address vulnerabilities in Docker Desktop. Users of the...

Ruby Library Security Update Advisory (CVE-2024-45409)

Overview  An update has been released to address vulnerabilities in Ruby Library. Users of the...

VMware Product Security Update Advisory (CVE-2024-38812, CVE-2024-38813)

Overview An update has been released to address vulnerabilities in VMware Products. Users of the...

NVIDIA Product Security Update Advisory (CVE-2024-0110)

Overview An update has been released to address vulnerabilities in NVIDIA Products. Users of the...

Weekly Detection Rule (YARA and Snort) Information – Week 3, September 2024

Weekly Detection Rule (YARA and Snort) Information – Week 3, September 2024

The following is the information on Yara and Snort rules (week 3, September 2024) collected and shared by the AhnLab TIP service. 5 YARA Rules Detection name Description Source PK_AdobePDF_dotloop Phishing Kit impersonating Adobe PDF Online https://github.com/t4d/PhishingKit-Yara-Rules PK_Bancontact_hem Phishing Kit impersonating Bancontact https://github.com/t4d/PhishingKit-Yara-Rules PK_DHL_blackforce Phishing Kit impersonating DHL https://github.com/t4d/PhishingKit-Yara-Rules PK_PayPal_de

OpenShift Security Update Advisory (CVE-2024-7387, CVE-2024-45496)

Overview An update has been released to address vulnerabilities in OpenShift. Users of the affected...

Ransom & Dark Web Issues Week 3, September 2024

Ransom & Dark Web Issues Week 3, September 2024

ASEC Blog publishes Ransom & Dark Web Issues Week 3, September 2024      

Kimsuky Group’s Malware  Disguised as Lecture Request Form (MSC, HWP)

Kimsuky Group’s Malware Disguised as Lecture Request Form (MSC, HWP)

Recently, malware disguised as a lecture request form targeting specific users was identified.  The distributed files include Hangul Word Processor (HWP) documents and files in MSC format, which download additional malicious files. Decoy document files used to disguise as legitimate documents have been found to sometimes contain personal information, suggesting